Implementing digital forensic readiness :
Material type: TextDescription: xvii, 355 pages : illustrationsISBN: 9780128044544Subject(s): Computer crimes | Digital forensic scienceItem type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
Books | Gabriel Afolabi Ojo Central Library (Headquarters). | HV8079 .S23 2016 (Browse shelf(Opens below)) | Available | 0160644 | |
Books | Gabriel Afolabi Ojo Central Library (Headquarters). | HV8079 .S23 2016 (Browse shelf(Opens below)) | Available | 0163661 |
Browsing Gabriel Afolabi Ojo Central Library (Headquarters). shelves Close shelf browser (Hides shelf browser)
HV8073 .I63 2019 Textbook Of Forensic Chemistry | HV8077.5 .B56 B48 2008 Bloodstain pattern analysis : | HV8079 .S23 2016 Implementing digital forensic readiness : | HV8079 .S23 2016 Implementing digital forensic readiness : | HV8079.35 .H45 2019 Criminological and forensic psychology / | HV8079.35 .H45 2019 Criminological and forensic psychology / | HV8079.35.H45 2019 CRIMINOLOGICAL |
Minimal Level Cataloging Plus.
Understanding digital forensics -- Investigate process models -- Evidence management -- Understanding forensic readiness -- Define business risk scenarios -- Identity potential data sources -- Determine collection requirements -- Establish legal admissibility -- Establish secure storage and handling -- Enable targeted monitoring -- Map investigative workflows -- Establish continuing education -- Maintain evidence-based reporting -- Ensure legal review -- Accomplishing forensic readiness -- Appendices: A. Investigative process models -- B. Education and professional certifications -- C. Tool and equipment validation program -- D. Service catalog -- E. Cost-benefit analysis -- F. Building taxonomy -- G. Risk assessment -- H. Threat modeling -- I. Data warehouse introduction -- J. Requirements analysis -- K. Investigative workflow -- Templates: A. Test case document -- B. Investigator logbook -- C. Chain of custody tracking form -- D. Investigative final report -- E. Service catalog -- F. Business case document -- G. Net present value -- H. Threat/risk assessment report -- I. Data source inventory matrix -- J. Project charter document -- K. Requirements specification document.
There are no comments on this title.